We Rely On Your Support: This site is primarily supported by advertisements. Ads are what have allowed this site to be maintained for the past 15 years. We do our best to ensure only clean, relevant ads are shown, when any nasty ads are detected, we work to remove them ASAP. If you would like to view the site without ads while still supporting our work, please consider our ad-free Phoronix Premium. You can also consider a tip via PayPal.The Current Spectre / Meltdown Mitigation Overhead Benchmarks On Linux 5.0

With it being a little over one year since Spectre and Meltdown mitigations became public and with the Linux kernel today hitting the big "5.0" release, I decided to run some benchmarks of the current out-of-the-box performance hit as a result of the current default mitigation techniques employed by the Linux kernel. The default vs. unmitigated performance impact for Spectre/Meltdown are tested on an Intel Core i7 and Core i9 systems while there is also an AMD Ryzen 7 box for reference with its Spectre mitigation impact on Linux 5.0.

These tests are for reference purposes to see what the default/out-of-the-box performance cost is to Spectre/Meltdown on the Linux 5.0 kernel being released today. The near-final 5.0 Git snapshots were used for testing atop Ubuntu 18.10 on three different systems - the hardware is different in these systems in looking at their mitigated vs. unmitigated performance impact rather than looking at the raw CPU performance between systems.

The "mitigated" benchmarks were done with the default configuration while the "unmitigated" tests were done via the run-time disabling of the relevant options, though that does still leave user pointer sanitization and such enabled. Additionally, the same BIOS/microcode (the latest on each system) was maintained the same as opposed to comparing pre/post states... Basically looking at the 2019 out-of-the-box cost to these mitigations after being revised over several kernel cycles now compared to what interested users can achieve by disabling these mitigations, albeit sacrificing security.

Via the Phoronix Test Suite a range of benchmarks were run in various workloads affected by these widely talked about CPU vulnerabilities over the past year.

The mission at Phoronix since 2004 has centered around enriching the Linux hardware experience. In addition to supporting our site through advertisements, you can help by subscribing to Phoronix Premium. You can also use our NewEgg.com shopping links when making online purchases or contribute to Phoronix through a PayPal tip.